{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T04:37:43.560","vulnerabilities":[{"cve":{"id":"CVE-2018-1999024","sourceIdentifier":"cve@mitre.org","published":"2018-07-23T16:29:00.320","lastModified":"2024-11-21T03:57:04.703","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \\unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later."},{"lang":"es","value":"MathJax en versiones anteriores a la 2.7.4 contiene una vulnerabilidad Cross-Site Scripting (XSS) en la macro \\unicode{} que puede resultar en la ejecución de JavaScript potencialmente no fiable en un navegador web. Este ataque parece ser explotable si la víctima visualiza una página en la que se procesa contenido no fiable mediante Mathjax. La vulnerabilidad parece haber sido solucionada en las versiones 2.7.4 y siguientes."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mathjax:mathjax:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.4","matchCriteriaId":"6CCD874E-0F42-48FD-A72C-7DA0A8837CAC"}]}]}],"references":[{"url":"https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1","source":"cve@mitre.org","tags":["Patch","Third Party Advisory"]},{"url":"https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}